메뉴 건너뛰기




Volumn , Issue , 2013, Pages 136-144

Certificateless public auditing for data integrity in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

MANAGEMENT; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84893594141     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNS.2013.6682701     Document Type: Conference Paper
Times cited : (118)

References (29)
  • 3
    • 84872270487 scopus 로고    scopus 로고
    • June [Online]. Available
    • (2011, June) Yesterday's Authentication Bug. [Online]. Available: http://blog.dropbox.com/index.php/yesterdays-authentication-bug/
    • (2011) Yesterday's Authentication Bug
  • 6
    • 70350389843 scopus 로고    scopus 로고
    • Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing," in the Proceedings of ESORICS 2009, 2009, pp. 355-370.
    • (2009) The Proceedings of ESORICS 2009 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 8
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in the Proceedings of IEEE INFOCOM 2010, 2010, pp. 525-533.
    • (2010) The Proceedings of IEEE INFOCOM 2010 , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 10
    • 79959325063 scopus 로고    scopus 로고
    • Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds
    • Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S.Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds," in the Proceedings of ACM SAC 2011, 2011, pp. 1550-1557.
    • (2011) The Proceedings of ACM SAC 2011 , pp. 1550-1557
    • Zhu, Y.1    Wang, H.2    Hu, Z.3    Ahn, G.-J.4    Hu, H.5    Yau, S.S.6
  • 12
    • 84866761388 scopus 로고    scopus 로고
    • Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    • B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," in the Proceedings of IEEE Cloud 2012, 2012, pp. 295-302.
    • (2012) The Proceedings of IEEE Cloud 2012 , pp. 295-302
    • Wang, B.1    Li, B.2    Li, H.3
  • 13
    • 84873677485 scopus 로고    scopus 로고
    • New Approaches to Security and Availability for Cloud Data
    • A. Juels and A. Oprea, "New Approaches to Security and Availability for Cloud Data," Communications of the ACM, vol. 56, no. 2, pp. 64-73, 2013.
    • (2013) Communications of the ACM , vol.56 , Issue.2 , pp. 64-73
    • Juels, A.1    Oprea, A.2
  • 14
    • 84883057189 scopus 로고    scopus 로고
    • Public Auditing for Shared Data with Efficient User Revoation in the Cloud
    • B.Wang, B. Li, and H. Li, "Public Auditing for Shared Data with Efficient User Revoation in the Cloud," in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904-2912.
    • (2013) The Proceedings of IEEE INFOCOM 2013 , pp. 2904-2912
    • Wang, B.1    Li, B.2    Li, H.3
  • 15
    • 84891354182 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
    • B. Wang, H. Li, and M. Li, "Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics," in the Proceedings of IEEE ICC 2013, 2013, pp. 539-543.
    • (2013) The Proceedings of IEEE ICC 2013 , pp. 539-543
    • Wang, B.1    Li, H.2    Li, M.3
  • 16
    • 84893341393 scopus 로고    scopus 로고
    • Storing Shared Data on the Cloud via Security-Mediator
    • B. Wang, S. S. Chow, M. Li, and H. Li, "Storing Shared Data on the Cloud via Security-Mediator," in the Proceedings of ICDCS 2013, 2013, pp. 124-133.
    • (2013) The Proceedings of ICDCS 2013 , pp. 124-133
    • Wang, B.1    Chow, S.S.2    Li, M.3    Li, H.4
  • 17
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • C. Ellison and B. Schneier, "Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure," Computer Security Journal, vol. 16, no. 1, pp. 1-7, 2000. (Pubitemid 30565287)
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 18
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's Not Dead, Just Resting
    • DOI 10.1109/MC.2002.1023787
    • P. Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, vol. 35, no. 8, pp. 41-49, 2002. (Pubitemid 34950479)
    • (2002) Computer , vol.35 , Issue.8 , pp. 41-49
    • Gutmann, P.1
  • 21
  • 22
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • Springer-Verlag
    • A. Shamir, "Identity-based Cryptosystems and Signature Schemes," in the Proceedings of CRYPTO'84 . Springer-Verlag, 1984, pp.47-53.
    • (1984) The Proceedings of CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 23
    • 35248844436 scopus 로고    scopus 로고
    • An Identity-Based Signature from Gap Diffie-Hellman Groups
    • Springer-Verlag
    • J. C. Cha and J. H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," in the Proceedings of PKC 2003. Springer-Verlag, 2003, pp. 18-30.
    • (2003) The Proceedings of PKC 2003 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 24
    • 33744786523 scopus 로고    scopus 로고
    • On the Security of Certificateless Signature Schemes from Asiacrypt 2003
    • Springer-Verlag
    • X. Huang, W. Susilo, Y. Mu, and F. Zhang, "On the Security of Certificateless Signature Schemes from Asiacrypt 2003," in the Proceedings of CANS 2005. Springer-Verlag, 2005, pp. 13-25.
    • (2005) The Proceedings of CANS 2005 , pp. 13-25
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 25
    • 33746591632 scopus 로고    scopus 로고
    • Certificateless Public-Key Signature: Security Model and Efficient Construction
    • Springer-Verlag
    • Z. Zhang, D. S. Wong, J. Xu, and D. Feng, "Certificateless Public-Key Signature: Security Model and Efficient Construction," in the Proceedings of ACNS 2006. Springer-Verlag, 2006, pp. 293-308.
    • (2006) The Proceedings of ACNS 2006 , pp. 293-308
    • Zhang, Z.1    Wong, D.S.2    Xu, J.3    Feng, D.4
  • 26
    • 61849086789 scopus 로고    scopus 로고
    • A New Certificateless Aggregate Signature Scheme
    • L. Zhang and F. Zhang, "A New Certificateless Aggregate Signature Scheme," Computer Communications, vol. 32, no. 6, pp. 1079-1085, 2009.
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1079-1085
    • Zhang, L.1    Zhang, F.2
  • 28
    • 84872004857 scopus 로고    scopus 로고
    • CL-PRE: A Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
    • L. Xu, X. Wu, and X. Zhang, "CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud," in the Proceedings of ACM ASIACCS 2012, 2012.
    • (2012) The Proceedings of ACM ASIACCS 2012
    • Xu, L.1    Wu, X.2    Zhang, X.3
  • 29
    • 84863472230 scopus 로고    scopus 로고
    • Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
    • Springer-Verlag, June
    • B.Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," in the Proceedings of ACNS 2012. Springer-Verlag, June 2012, pp. 507-525.
    • (2012) The Proceedings of ACNS 2012 , pp. 507-525
    • Wang, B.1    Li, B.2    Li, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.